by Protagonist X » Thu Jan 30, 2003 1:02 pm
Ooooooooooh-Kay...
Let me see... I'm weak in a lot of the mathematics necessary to explain how this sort of thing works, but here's the Reader's Digest version.
The sort of encryption being referred to is, if I understand correctly, what's called public key encryption. The important thing here is that the "key that unlocks it" is only one aspect of what's going on.
There's two keys, you see: the public one (which is made public in large directories, as its name might suggest) and the private key (which you and only you are supposed to have).
If I want to send a message to you, I use the encryption algorithm to encrypt it using the public key. You then use your private key to decrypt it. The algorithm is structured in such a way that only your private key will easily decrypt it -- this is generally done by finding two very, very big prime numbers, and then seeing what (even more sizable) number results when you multiply them together. [WARNING: I'm oversimplifying things a bit; you'll want to read up on this via other sources].
Prime factoring is part of a class of mathematic operations that (if my higher math training from the excellent movie "Sneakers" serves me correctly) are called "trap-door equations;" they're easy to get into but hard to get out of. Multiplying two big primes to get another very very large number is easy, and that's (roughly) how we get the message encrypted. Dividing the very very large number by the known bits of the prime number in your private key to decrypt it? Also easy.
But if the NSA or whoever wants to intercept the message? It's many orders of magnitude more difficult to factor out the very very large number and figure out from scratch what primes were used to encrypt it. And they don't automatically get your private key by doing so.
The primes are only one part of the algorithm, so for simplicity's sake just accept that they're there and forget about them. The jist of it all:
* You have a key, and the algorithm splits it into two parts. One is private for you and you alone, one is publicly distributable.
* When I send you an encrypted message, I encrypt it using the public key. I cannot decrypt it: all I can do is wrap it up for you to decrypt on your own.
*You and you alone can decrypt the mail, because you have the other half of the key, the private one.
As an interesting corollary, the inverse... er, converse? I forget all this stuff -- dammit, Jim, I'm a Media Arts major, not a Boolean logician!
*ahem* As an interesting corollary, we can switch the keys around for a secure digital signature.
I want you to accept that I'm the real Zachary Bishop, not just some guy faking it. So I encrypt a brief message using my private key, not the public one. This message can be decrypted by anyone using the public key. Since anything run through the decryption algorithm using the public key would return gobbledygook if it wasn't encrypted by the proper and true private key, you can be sure I'm me, as long as we're both sure I didn't let anyone else see my private key.
Sorry for the length of this post, I didn't have time to write a short one.
PTX -- no, really. I swear it's me.
Ooooooooooh-Kay...
Let me see... I'm weak in a lot of the mathematics necessary to explain [i]how[/i] this sort of thing works, but here's the Reader's Digest version.
The sort of encryption being referred to is, if I understand correctly, what's called [u]public key encryption[/u]. The important thing here is that the "key that unlocks it" is only one aspect of what's going on.
There's two keys, you see: the public one (which is made public in large directories, as its name might suggest) and the private key (which you and only you are supposed to have).
If I want to send a message to you, I use the encryption algorithm to encrypt it using the public key. You then use your private key to decrypt it. The algorithm is structured in such a way that only your private key will easily decrypt it -- this is generally done by finding two very, very big prime numbers, and then seeing what (even more sizable) number results when you multiply them together. [WARNING: I'm oversimplifying things a bit; you'll want to read up on this via other sources].
Prime factoring is part of a class of mathematic operations that (if my higher math training from the excellent movie "Sneakers" serves me correctly) are called "trap-door equations;" they're easy to get into but hard to get out of. Multiplying two big primes to get another very very large number is easy, and that's (roughly) how we get the message encrypted. Dividing the very very large number by the known bits of the prime number in your private key to decrypt it? Also easy.
But if the NSA or whoever wants to intercept the message? It's many orders of magnitude more difficult to factor out the very very large number and figure out from scratch what primes were used to encrypt it. And they don't automatically get your private key by doing so.
The primes are only one part of the algorithm, so for simplicity's sake just accept that they're there and forget about them. The jist of it all:
* You have a key, and the algorithm splits it into two parts. One is private for you and you alone, one is publicly distributable.
* When I send you an encrypted message, I encrypt it using the public key. [b]I cannot [u]de[/u]crypt it[/b]: all I can do is wrap it up for you to decrypt on your own.
*You and you alone can decrypt the mail, because you have the other half of the key, the private one.
As an interesting corollary, the inverse... er, converse? I forget all this stuff -- dammit, Jim, I'm a Media Arts major, not a Boolean logician!
*ahem* As an interesting corollary, we can [i]switch the keys around[/i] for a secure digital signature.
I want you to accept that I'm the real Zachary Bishop, not just some guy faking it. So I encrypt a brief message using my [i]private[/i] key, not the public one. This message can be decrypted by anyone using the [i]public[/i] key. Since anything run through the decryption algorithm using the public key would return gobbledygook if it wasn't encrypted by the proper and true private key, you can be sure I'm me, as long as we're both sure I didn't let anyone else see my private key.
Sorry for the length of this post, I didn't have time to write a short one.
PTX -- no, really. I swear it's me.